Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

Ransomware: What to Do When It Happens to You Image

Ransomware: What to Do When It Happens to You

Kiran Raj & Mallory Jensen

In the event that your company is the victim of a ransomware attack, this article provides steps to be taken as part of its response to such an incident. It is meant to be a helpful guide, but the best response generally will depend on different factors, including the scope and severity of the attack, availability of remediation measures, and business sensitivities.

Features

<i>Legal Tech:</i>What an Attorney Can Learn from Legal Tech Marketing Professionals Image

<i>Legal Tech:</i>What an Attorney Can Learn from Legal Tech Marketing Professionals

Jonathan Friedland

Some key takeaways and hot topics that should be on the radar of lawyers from the Legal Marketing Association's Legal Marketing Technology Conference in Chicago.

Features

SEC's New Cyber Unit Moves to Tackle 'Scam' Coin Offering Image

SEC's New Cyber Unit Moves to Tackle 'Scam' Coin Offering

Ben Hancock

<b><i>In the First Enforcement Action Initiated By Its New “Cyber Unit,” the SEC Announced It Has Secured a Court Order to Freeze the Assets of Individuals Behind a “Scam” Initial Coin Offering</b></i><p>In the first enforcement action initiated by its new “Cyber Unit,” the Securities and Exchange Commission (SEC) recently announced it has secured a court order to freeze the assets of individuals behind a “scam” initial coin offering, or ICO. 

Features

In an Era of Crises and Controversies, How Ready Is Your Law Firm? Image

In an Era of Crises and Controversies, How Ready Is Your Law Firm?

Vivian Hood

Although the current news cycle is a barrage of negative situations, the silver lining is that they offer law firms a wealth of teachable moments about the importance of preparing for and responding to a crisis situation.

Features

The Cyber Shot Across the Bow: Data Manipulation and GPS Spoofing Image

The Cyber Shot Across the Bow: Data Manipulation and GPS Spoofing

Michael Bahar, Bronwyn McDermott & Trevor J. Satnick

In September 2015, then-Director of National Intelligence James Clapper warned that the next "push of the envelope" in cybersecurity might be attacks that change or manipulate electronic information in order to compromise its accuracy or reliability. Two years later, we may now be seeing the beginning of such insidious attacks, in the context of GPS spoofing — a technique that sends false signals to systems that use GPS signals for navigation.

Features

Regulators Are Catching Up to Cryptocurrency and Blockchain Technology within the Financial Services Industry Image

Regulators Are Catching Up to Cryptocurrency and Blockchain Technology within the Financial Services Industry

Craig Nazzaro, Brad Rustin & John Jennings

<b><i>Part One of a Two-Part Article</b></i><p>As we head into 2018, cryptocurrency and blockchain will continue to be a top initiative for pioneers in the financial services industry. As with any innovation within the financial services industry, the regulators are never far behind and are doing their best to keep up. Those that enter this space will find that they also have to pioneer the controls to manage the regulatory risks this technology presents.

Features

Five Smart Steps to Prepare for GDPR Data Subject Rights Image

Five Smart Steps to Prepare for GDPR Data Subject Rights

Sonia Cheng, Eckhard Herych, & Richard MacDonald

Many corporations around the globe are preparing for May 2018, when Europe's General Data Protection Regulation (GDPR) enforcement kicks in. The regulation encompasses a wide range of nuanced privacy requirements that can be challenging to operationalize. In particular, requirements around the rights of European data subjects — which include the right to be forgotten and rights to access, rectification and objection to processing — will be some of the most difficult to address.

Features

Artificial Intelligence: Knowing When It's Right for Your Firm Image

Artificial Intelligence: Knowing When It's Right for Your Firm

Arup Das

Gone are the days when being the best lawyer was enough to guarantee landing and retaining clients. Clients are demanding that firms incorporate automation and increase their efficiency. Clients are relying on automation to streamline the work they outsource, and they expect their law firms to follow suit. To this end and to remain competitive, law firms need to offer their clients innovative solutions and build artificial intelligence (AI) into the core fabric of their practices.

Features

NY AG Proposes Stricter Data Security Laws Citing Equifax Breach Image

NY AG Proposes Stricter Data Security Laws Citing Equifax Breach

Josefa Velasquez

Following the Equifax Inc. breach that compromised personal information of 145.5 million Americans including more than 8 million New Yorkers, Attorney General Eric Schneiderman is proposing comprehensive legislation to tighten data security laws

Features

Data Integrity and Incident Response Image

Data Integrity and Incident Response

Benjamin Dynkin, Barry Dynkin & E.J. Hilbert

The skill required to successfully exfiltrate 143 million records is certainly sufficient to successfully attack the integrity of that very same data. It is generally accepted that cyber criminals have not performed integrity attacks because there is a minimal profit motive: Records have a black-market value; in integrity attacks, there is no deliverable that can be sold. This paradigm may be shifting.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES